Analysis on Security Issues for Mobile P2P Networks

被引:0
|
作者
Tang Hong-Bo [1 ]
Yang Zhi-Xing [1 ]
Chen Long [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2012年
关键词
mobile peer-to-peer networks; malicious behaviors; security; reputation systems; attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the concepts of decentralization and multi-hop transmission, mobile P2P networks are suffering from attacks launched by malicious members. Aiming at guarding MP2P networks, this paper analyzes the challenges and attacks for MP2P networks, and gives possible countermeasures to defend the threats. Also, current reputation systems are discussed in detail, including potential threats they are facing with and so on. Furthermore, considerations on how to construct robust reputation systems are given.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Secure Digital Contents Distributing System on P2P Networks
    Ing-Chau Chang
    Hung-Wen Yang
    Journal of Electronic Science and Technology, 2012, (03) : 263 - 268
  • [32] On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (13)
  • [33] Improvements on the Security of P2P File-sharing System Based on JXTA
    Li, Ying
    Yang, Lijuan
    Zhang, Chune
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1503 - 1506
  • [34] Malicious Peers Eviction for P2P Overlays
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
  • [35] A Secure and Lightweight Micro-Payment Scheme in P2P Networks
    Huang, Qiubo
    Zhao, Yuqing
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 134 - 137
  • [36] AuthenticPeer plus plus : A Trust Management System for P2P Networks
    Alkharji, Sarah
    Kurdi, Heba
    Altamimi, Rasha
    Aloboud, Ebtesam
    UKSIM-AMSS 11TH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2017), 2017, : 191 - 196
  • [37] Bubble Trust: A Reliable Trust Management for Large P2P Networks
    Novotny, Miroslav
    Zavoral, Filip
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 359 - 373
  • [38] A Game Based Passive Worm Defense Model for P2P Networks
    Tang, Haokun
    Huang, Jun
    Wang, Wei
    APPLIED COMPUTING REVIEW, 2014, 14 (01): : 20 - 29
  • [39] Customer adoption of p2p mobile payment systems: The role of perceived risk
    Belanche, Daniel
    Guinaliu, Miguel
    Albas, Pablo
    TELEMATICS AND INFORMATICS, 2022, 72
  • [40] Random visitor: Defense against identity attacks in P2P networks
    Gu, Jabeom
    Nah, Jaehoon
    Kwon, Hyeokchan
    Jang, Jongsoo
    Park, Sehyun
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (04): : 1058 - 1073